Phishing attacks

How to Protect Your Website from Hackers?
  • Discover
  • Cyberattacks
  • +1

How to Protect Your Website from Hackers?

At the time of the rapid digital transformation of the global economy, companies communicate with their clients either through social media channels or using their websites. By opening the company’s website users can view all recent updates, buy products or services, contact the company’s representatives, get special offers, etc. When the company’s website is down,

22 May 2022

Are NFTs Safe? How to Ensure Security of Your NFTs?
  • Discover
  • Cybersecurity research
  • +1

Are NFTs Safe? How to Ensure Security of Your NFTs?

Definition of NFT Non-fungible tokens (NFT) are virtual assets trackable on blockchain and each virtual asset has a unique nature. The value of NFTs is determined by their attributes, special traits, minting number, and market demand.  The key characteristics of a non-fungible token are: Linkage to physical or virtual assets. Owning an NFT means having

29 Dec 2021

DeFi Security Risks and Hacks in 2021
  • Insights
  • Cybersecurity research
  • +2

DeFi Security Risks and Hacks in 2021

DeFi is the term attributable to decentralized financial systems including, among other activities, decentralized trading of virtual assets. One of the main characteristics of the DeFi system is no need for a middleman and autonomous nature. According to DeFi Pulse, the total value of assets locked in DeFi has reached more than $100 bln. DeFi

9 Dec 2021

How do hackers access corporate networks? Phishing attacks
  • Discover
  • Cybersecurity research
  • +1

How do hackers access corporate networks? Phishing attacks

Cyberattacks as the main threat affecting businesses Criminal attacks on companies are an indispensable element of modern business. However, in the era of massive digitization of business processes, cyberattacks have become one of the most popular instruments in the hands of malicious actors striving to gain access to corporate assets, mostly money. The most lucrative

21 Jun 2021

Subscribe to our research

Enter your email address to subscribe to Hacken Reseach and receive notifications of new posts by email

[contact-form-7 id="8165" title="Subscribe"]

Interested in getting to know whether your systems are vulnerable to cyberattacks?

Tell us about your project

  • This field is required
  • This field is required
    • telegram icon Telegram
    • whatsapp icon WhatsApp
    • wechat icon WeChat
    • signal icon Signal
  • This field is required
  • This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Apply for partnership

  • This field is required
  • This field is required
  • This field is required
  • This field is required
    • Foundation
    • VC
    • Angel investments
    • IDO or IEO platform
    • Protocol
    • Blockchain
    • Legal
    • Insurance
    • Development
    • Marketing
    • Influencer
    • Other
This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Get in touch

  • This field is required
  • This field is required
  • This field is required
  • This field is required
This field is required
By submitting this form you agree to the Privacy Policy and information beeing used to contact you
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo